Searched refs:peerMsg (Results 1 – 6 of 6) sorted by relevance
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/protocol_lib/ |
H A D | iso_protocol.c | 106 if (msg->peerMsg.length > 0 && msg->peerMsg.val != NULL) { in BuildSelfTokenMessage() 107 …if (memcpy_s(message + usedLen, messageLen - usedLen, msg->peerMsg.val, msg->peerMsg.length) != EO… in BuildSelfTokenMessage() 139 if (msg->peerMsg.length > 0 && msg->peerMsg.val != NULL) { in BuildPeerTokenMessage() 140 …if (memcpy_s(message + usedLen, messageLen - usedLen, msg->peerMsg.val, msg->peerMsg.length) != EO… in BuildPeerTokenMessage() 144 usedLen += msg->peerMsg.length; in BuildPeerTokenMessage() 161 msg->selfMsg.length + msg->peerMsg.length; in IsoCalToken() 796 static int32_t SetIsoPeerProtectedMsg(BaseProtocol *self, const Uint8Buff *peerMsg) in SetIsoPeerProtectedMsg() argument 798 if ((self == NULL) || !IsUint8BuffValid(peerMsg, PROTECTED_MSG_MAX_LEN)) { in SetIsoPeerProtectedMsg() 802 if (DeepCopyUint8Buff(peerMsg, &self->protectedMsg.peerMsg) != HC_SUCCESS) { in SetIsoPeerProtectedMsg() 830 ClearFreeUint8Buff(&impl->base.protectedMsg.peerMsg); in DestroyIsoProtocol()
|
H A D | dl_speke_protocol.c | 532 …Uint8Buff *firstProtectedMsg = isVerify ? &(impl->base.protectedMsg.peerMsg) : &(impl->base.protec… in CombineProtectedMsg() 533 …dProtectedMsg = isVerify ? &(impl->base.protectedMsg.selfMsg) : &(impl->base.protectedMsg.peerMsg); in CombineProtectedMsg() 594 impl->base.protectedMsg.peerMsg.length; in CalKcfDataSelf() 622 impl->base.protectedMsg.peerMsg.length; in VerifyKcfDataPeer() 1057 static int32_t SetDlSpekePeerProtectedMsg(BaseProtocol *self, const Uint8Buff *peerMsg) in SetDlSpekePeerProtectedMsg() argument 1059 if ((self == NULL) || !IsUint8BuffValid(peerMsg, PROTECTED_MSG_MAX_LEN)) { in SetDlSpekePeerProtectedMsg() 1063 if (DeepCopyUint8Buff(peerMsg, &self->protectedMsg.peerMsg) != HC_SUCCESS) { in SetDlSpekePeerProtectedMsg() 1091 ClearFreeUint8Buff(&impl->base.protectedMsg.peerMsg); in DestroyDlSpekeProtocol()
|
H A D | ec_speke_protocol.c | 509 …Uint8Buff *firstProtectedMsg = isVerify ? &(impl->base.protectedMsg.peerMsg) : &(impl->base.protec… in CombineProtectedMsg() 510 …dProtectedMsg = isVerify ? &(impl->base.protectedMsg.selfMsg) : &(impl->base.protectedMsg.peerMsg); in CombineProtectedMsg() 575 impl->base.protectedMsg.peerMsg.length; in CalKcfDataSelf() 608 impl->base.protectedMsg.peerMsg.length; in VerifyKcfDataPeer() 1040 static int32_t SetEcSpekePeerProtectedMsg(BaseProtocol *self, const Uint8Buff *peerMsg) in SetEcSpekePeerProtectedMsg() argument 1042 if ((self == NULL) || !IsUint8BuffValid(peerMsg, PROTECTED_MSG_MAX_LEN)) { in SetEcSpekePeerProtectedMsg() 1046 if (DeepCopyUint8Buff(peerMsg, &self->protectedMsg.peerMsg) != HC_SUCCESS) { in SetEcSpekePeerProtectedMsg() 1074 ClearFreeUint8Buff(&impl->base.protectedMsg.peerMsg); in DestroyEcSpekeProtocol()
|
/ohos5.0/base/security/device_auth/services/session_manager/src/session/v2/auth_sub_session/ |
H A D | auth_sub_session.c | 113 static int32_t SetPeerProtectedMsg(AuthSubSession *self, const Uint8Buff *peerMsg) in SetPeerProtectedMsg() argument 115 if ((self == NULL) || (peerMsg == NULL)) { in SetPeerProtectedMsg() 120 return impl->instance->setPeerProtectedMsg(impl->instance, peerMsg); in SetPeerProtectedMsg()
|
/ohos5.0/base/security/device_auth/services/session_manager/inc/session/v2/auth_sub_session/ |
H A D | auth_sub_session.h | 36 int32_t (*setPeerProtectedMsg)(AuthSubSession *self, const Uint8Buff *peerMsg);
|
/ohos5.0/base/security/device_auth/services/session_manager/inc/session/v2/auth_sub_session/protocol_lib/ |
H A D | base_protocol.h | 26 Uint8Buff peerMsg; member
|